Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.14.114.89 attack
port scan and connect, tcp 80 (http)
2020-07-11 20:08:15
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.114.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.114.22.			IN	A

;; AUTHORITY SECTION:
.			317	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:54:46 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 22.114.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.114.14.106.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.172.201.94 attackspambots
2020-09-28T16:28:55.582095mail.thespaminator.com sshd[12323]: Invalid user anita from 167.172.201.94 port 38286
2020-09-28T16:28:57.093012mail.thespaminator.com sshd[12323]: Failed password for invalid user anita from 167.172.201.94 port 38286 ssh2
...
2020-09-29 04:56:41
93.183.226.218 attackbotsspam
(sshd) Failed SSH login from 93.183.226.218 (UA/Ukraine/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 27 16:46:55 server2 sshd[17953]: Invalid user user2 from 93.183.226.218
Sep 27 16:46:55 server2 sshd[17953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.183.226.218 
Sep 27 16:46:57 server2 sshd[17953]: Failed password for invalid user user2 from 93.183.226.218 port 58834 ssh2
Sep 27 16:54:20 server2 sshd[26899]: Invalid user money from 93.183.226.218
Sep 27 16:54:20 server2 sshd[26899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.183.226.218
2020-09-29 04:49:33
185.74.4.17 attackbots
Sep 28 22:50:20 vserver sshd\[8000\]: Invalid user redmine from 185.74.4.17Sep 28 22:50:22 vserver sshd\[8000\]: Failed password for invalid user redmine from 185.74.4.17 port 39903 ssh2Sep 28 22:54:21 vserver sshd\[8027\]: Failed password for root from 185.74.4.17 port 41343 ssh2Sep 28 22:58:08 vserver sshd\[8061\]: Invalid user hadoop4 from 185.74.4.17
...
2020-09-29 05:04:14
51.68.91.191 attackbotsspam
Invalid user ravi from 51.68.91.191 port 47840
2020-09-29 04:46:49
119.38.189.164 attackspam
fail2ban -- 119.38.189.164
...
2020-09-29 04:36:55
36.148.23.50 attackbots
2020-09-28T13:36:36.646731linuxbox-skyline sshd[204551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.148.23.50  user=root
2020-09-28T13:36:38.880667linuxbox-skyline sshd[204551]: Failed password for root from 36.148.23.50 port 49336 ssh2
...
2020-09-29 04:44:07
82.65.19.181 attackbots
Sep 28 22:00:06 * sshd[32714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.19.181
Sep 28 22:00:08 * sshd[32714]: Failed password for invalid user ubuntu from 82.65.19.181 port 57106 ssh2
2020-09-29 04:51:40
175.155.233.148 attack
2020-09-28T01:03:03.545763abusebot-8.cloudsearch.cf sshd[29956]: Invalid user it from 175.155.233.148 port 42496
2020-09-28T01:03:03.552385abusebot-8.cloudsearch.cf sshd[29956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.155.233.148
2020-09-28T01:03:03.545763abusebot-8.cloudsearch.cf sshd[29956]: Invalid user it from 175.155.233.148 port 42496
2020-09-28T01:03:06.188072abusebot-8.cloudsearch.cf sshd[29956]: Failed password for invalid user it from 175.155.233.148 port 42496 ssh2
2020-09-28T01:08:26.116194abusebot-8.cloudsearch.cf sshd[30080]: Invalid user flask from 175.155.233.148 port 48482
2020-09-28T01:08:26.122327abusebot-8.cloudsearch.cf sshd[30080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.155.233.148
2020-09-28T01:08:26.116194abusebot-8.cloudsearch.cf sshd[30080]: Invalid user flask from 175.155.233.148 port 48482
2020-09-28T01:08:28.432065abusebot-8.cloudsearch.cf sshd[30080]: F
...
2020-09-29 04:52:14
129.211.24.104 attack
Invalid user zzy from 129.211.24.104 port 47400
2020-09-29 04:37:27
51.210.14.124 attackbots
Sep 28 15:28:51 rush sshd[31355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.14.124
Sep 28 15:28:54 rush sshd[31355]: Failed password for invalid user bianca from 51.210.14.124 port 48432 ssh2
Sep 28 15:35:50 rush sshd[31494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.14.124
...
2020-09-29 04:45:43
183.47.40.37 attackbots
fail2ban/Sep 28 03:39:36 h1962932 sshd[26468]: Invalid user ravi from 183.47.40.37 port 50578
Sep 28 03:39:36 h1962932 sshd[26468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.47.40.37
Sep 28 03:39:36 h1962932 sshd[26468]: Invalid user ravi from 183.47.40.37 port 50578
Sep 28 03:39:39 h1962932 sshd[26468]: Failed password for invalid user ravi from 183.47.40.37 port 50578 ssh2
Sep 28 03:45:51 h1962932 sshd[27124]: Invalid user ubuntu from 183.47.40.37 port 58190
2020-09-29 05:07:28
220.186.188.205 attackspambots
Invalid user guest from 220.186.188.205 port 58728
2020-09-29 04:42:48
182.61.44.2 attackspam
(sshd) Failed SSH login from 182.61.44.2 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 28 12:30:42 server sshd[10778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.44.2  user=root
Sep 28 12:30:43 server sshd[10778]: Failed password for root from 182.61.44.2 port 57871 ssh2
Sep 28 12:39:34 server sshd[13097]: Invalid user admin from 182.61.44.2 port 36503
Sep 28 12:39:36 server sshd[13097]: Failed password for invalid user admin from 182.61.44.2 port 36503 ssh2
Sep 28 12:43:32 server sshd[14108]: Invalid user glenn from 182.61.44.2 port 53960
2020-09-29 04:51:25
103.114.208.198 attack
Sep 28 22:36:38 srv-ubuntu-dev3 sshd[16164]: Invalid user yy from 103.114.208.198
Sep 28 22:36:38 srv-ubuntu-dev3 sshd[16164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.114.208.198
Sep 28 22:36:38 srv-ubuntu-dev3 sshd[16164]: Invalid user yy from 103.114.208.198
Sep 28 22:36:39 srv-ubuntu-dev3 sshd[16164]: Failed password for invalid user yy from 103.114.208.198 port 52477 ssh2
Sep 28 22:40:45 srv-ubuntu-dev3 sshd[16645]: Invalid user vnc from 103.114.208.198
Sep 28 22:40:45 srv-ubuntu-dev3 sshd[16645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.114.208.198
Sep 28 22:40:45 srv-ubuntu-dev3 sshd[16645]: Invalid user vnc from 103.114.208.198
Sep 28 22:40:47 srv-ubuntu-dev3 sshd[16645]: Failed password for invalid user vnc from 103.114.208.198 port 56553 ssh2
Sep 28 22:44:52 srv-ubuntu-dev3 sshd[17137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10
...
2020-09-29 04:56:57
27.6.18.245 attack
Wordpress attack
2020-09-29 05:01:23

Recently Reported IPs

106.14.12.221 106.14.113.16 106.14.112.55 106.14.103.129
106.139.97.186 106.139.92.195 106.139.7.225 106.139.71.240
106.139.41.137 106.139.40.212 106.139.43.250 106.139.205.140
106.139.190.163 106.139.182.248 106.139.67.83 106.139.167.27
106.139.36.106 106.139.173.98 106.139.179.43 106.139.138.42